Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2026-27893

vLLM is an inference and serving engine for large language models (LLMs). Starting in version 0.10.1 and prior to version 0.18.0, two model implementation files hardcode `trust_remote_code=True` when loading sub-components, bypassing the user's explicit `--trust-remote-code=False` security opt-out. This enables remote code execution via malicious model repositories even when the user has explicitly disabled remote code trust. Version 0.18.0 patches the issue.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 9.4%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2026-27893
  • Vllm » Vllm » Version: 0.10.1
    cpe:2.3:a:vllm:vllm:0.10.1
  • Vllm » Vllm » Version: 0.10.1.1
    cpe:2.3:a:vllm:vllm:0.10.1.1
  • Vllm » Vllm » Version: 0.10.2
    cpe:2.3:a:vllm:vllm:0.10.2
  • Vllm » Vllm » Version: 0.11.0
    cpe:2.3:a:vllm:vllm:0.11.0
  • Vllm » Vllm » Version: 0.11.1
    cpe:2.3:a:vllm:vllm:0.11.1
  • Vllm » Vllm » Version: 0.11.2
    cpe:2.3:a:vllm:vllm:0.11.2
  • Vllm » Vllm » Version: 0.12.0
    cpe:2.3:a:vllm:vllm:0.12.0
  • Vllm » Vllm » Version: 0.13.0
    cpe:2.3:a:vllm:vllm:0.13.0
  • Vllm » Vllm » Version: 0.14.0
    cpe:2.3:a:vllm:vllm:0.14.0
  • Vllm » Vllm » Version: 0.14.1
    cpe:2.3:a:vllm:vllm:0.14.1
  • Vllm » Vllm » Version: 0.15.0
    cpe:2.3:a:vllm:vllm:0.15.0
  • Vllm » Vllm » Version: 0.15.1
    cpe:2.3:a:vllm:vllm:0.15.1
  • Vllm » Vllm » Version: 0.15.2
    cpe:2.3:a:vllm:vllm:0.15.2
  • Vllm » Vllm » Version: 0.16.0
    cpe:2.3:a:vllm:vllm:0.16.0
  • Vllm » Vllm » Version: 0.16.1
    cpe:2.3:a:vllm:vllm:0.16.1
  • Vllm » Vllm » Version: 0.17.0
    cpe:2.3:a:vllm:vllm:0.17.0
  • Vllm » Vllm » Version: 0.17.1
    cpe:2.3:a:vllm:vllm:0.17.1


Contact Us

Shodan ® - All rights reserved